med-mastodon.com is one of the many independent Mastodon servers you can use to participate in the fediverse.
Medical community on Mastodon

Administered by:

Server stats:

337
active users

#RagnarLocker

0 posts0 participants0 posts today
Xavier «X» Santolaria :verified_paw: :donor:<p>📨 Latest issue of my curated <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> and <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> list of resources for week #42/2023 is out! It includes the following and much more:</p><p>➝ 🔓 👀 Tracking Unauthorized Access to <a href="https://infosec.exchange/tags/Okta" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Okta</span></a>'s Support System<br>➝ 🔓 🇯🇵 <a href="https://infosec.exchange/tags/Casio" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Casio</span></a> discloses <a href="https://infosec.exchange/tags/databreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>databreach</span></a> impacting customers in 149 countries<br>➝ 🔓 🧬 Hacker leaks millions more <a href="https://infosec.exchange/tags/23andMe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>23andMe</span></a> user records on <a href="https://infosec.exchange/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> forum<br>➝ 🔓 🇨🇳 D-Link confirms data breach after employee <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishing</span></a> attack<br>➝ 🔓 💰 <a href="https://infosec.exchange/tags/Equifax" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Equifax</span></a> Fined $13.5 Million Over 2017 Data Breach<br>➝ 🇺🇦 🧹 Ukrainian activists hack Trigona <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> gang, wipe servers<br>➝ 🇺🇸 🇰🇵 FBI: Thousands of Remote IT Workers Sent Wages to <a href="https://infosec.exchange/tags/NorthKorea" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NorthKorea</span></a> to Help Fund Weapons Program<br>➝ 🇮🇳 ☁️ <a href="https://infosec.exchange/tags/India" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>India</span></a> targets <a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a>, <a href="https://infosec.exchange/tags/Amazon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Amazon</span></a> tech support <a href="https://infosec.exchange/tags/scammers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>scammers</span></a> in nationwide crackdown<br>➝ 🇵🇸 🇮🇷 <a href="https://infosec.exchange/tags/Hamas" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hamas</span></a>-linked app offers window into cyber infrastructure, possible links to Iran<br>➝ 👮🏻‍♂️ 🥷🏻 Police seize <a href="https://infosec.exchange/tags/RagnarLocker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RagnarLocker</span></a> leak site<br>➝ 🇰🇵 North Korean Hackers Exploiting Recent <a href="https://infosec.exchange/tags/TeamCity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TeamCity</span></a> Vulnerability<br>➝ 🇨🇳 🇷🇺 <a href="https://infosec.exchange/tags/China" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>China</span></a> replaces <a href="https://infosec.exchange/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a> as top <a href="https://infosec.exchange/tags/cyberthreat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberthreat</span></a><br>➝ 🇺🇦 📡 CERT-UA Reports: 11 Ukrainian Telecom Providers Hit by Cyberattacks<br>➝ 🇫🇷 🇪🇸 <a href="https://infosec.exchange/tags/France" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>France</span></a> frees the two biggest Spanish hackers<br>➝ 🇺🇸 ⚓️ Ex-Navy IT head gets 5 years for selling people’s data on <a href="https://infosec.exchange/tags/darkweb" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>darkweb</span></a><br>➝ 🇨🇭 🗳️ <a href="https://infosec.exchange/tags/Switzerland" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Switzerland</span></a>’s e-voting system has predictable implementation blunder<br>➝ 🔓 🏭 Critical Vulnerabilities Expose ​​<a href="https://infosec.exchange/tags/Weintek" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Weintek</span></a> HMIs to Attacks<br>➝ 🔓 🏭 <a href="https://infosec.exchange/tags/Milesight" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Milesight</span></a> Industrial Router <a href="https://infosec.exchange/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> Possibly Exploited in Attacks<br>➝ 🦠 🇻🇳 Fake <a href="https://infosec.exchange/tags/Corsair" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Corsair</span></a> job offers on <a href="https://infosec.exchange/tags/LinkedIn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LinkedIn</span></a> push <a href="https://infosec.exchange/tags/DarkGate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DarkGate</span></a> malware<br>➝ 🦠 Google-hosted <a href="https://infosec.exchange/tags/malvertising" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malvertising</span></a> leads to fake <a href="https://infosec.exchange/tags/Keepass" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Keepass</span></a> site that looks genuine<br>➝ 🦠 💬 <a href="https://infosec.exchange/tags/Discord" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Discord</span></a> still a hotbed of <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> activity — Now APTs join the fun<br>➝ 🦠 🕵🏻‍♂️ SpyNote: Beware of This Android <a href="https://infosec.exchange/tags/Trojan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Trojan</span></a> that Records Audio and Phone Calls<br>➝ 🛍️ 🦠 <a href="https://infosec.exchange/tags/Android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Android</span></a> will now scan sideloaded apps for malware at install time<br>➝ 💬 🔐 <a href="https://infosec.exchange/tags/WhatsApp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WhatsApp</span></a> <a href="https://infosec.exchange/tags/passkeys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>passkeys</span></a> on the way, but as usual, for Android first<br>➝ 🇷🇺 🗂️ Pro-Russian Hackers Exploiting Recent <a href="https://infosec.exchange/tags/WinRAR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WinRAR</span></a> Vulnerability in New Campaign<br>➝ 🗓️ ❌ Signal Pours Cold Water on Zero-Day Exploit Rumors<br>➝ 🔓 💥 <a href="https://infosec.exchange/tags/Cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cisco</span></a> warns of new <a href="https://infosec.exchange/tags/IOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IOS</span></a> XE <a href="https://infosec.exchange/tags/zeroday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zeroday</span></a> actively exploited in attacks</p><p>📚 This week's recommended reading is: "RTFM: Red Team Field Manual v2" by Ben Clark and Nicholas Downer</p><p>Subscribe to the <a href="https://infosec.exchange/tags/infosecMASHUP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecMASHUP</span></a> newsletter to have it piping hot in your inbox every week-end ⬇️</p><p><a href="https://infosec-mashup.santolaria.net/p/infosec-mashup-week-422023" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec-mashup.santolaria.net/</span><span class="invisible">p/infosec-mashup-week-422023</span></a></p>
Tofu Musubi<p>“A&nbsp;central&nbsp;figure in the <a href="https://mastodon.world/tags/RagnarLocker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RagnarLocker</span></a> <a href="https://mastodon.world/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> group responsible for a&nbsp;string of cyberattacks&nbsp;around the world&nbsp;was arrested after a joint police investigation involving 11 countries, including Japan.&nbsp;<br>The&nbsp;dark website where the group published information stolen from its victims was also shut down.”</p><p><a href="https://www.asahi.com/sp/ajw/articles/15035467" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">asahi.com/sp/ajw/articles/1503</span><span class="invisible">5467</span></a></p>
Marcel SIneM(S)US<p>Internationalen Ermittlungsbehörden gelingt Schlag gegen <a href="https://social.tchncs.de/tags/RagnarLocker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RagnarLocker</span></a> | Security <a href="https://www.heise.de/news/Ermittlern-gelingt-Schlag-gegen-Ransomware-Gang-Ragnar-Locker-9340480.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Ermittlern-gelin</span><span class="invisible">gt-Schlag-gegen-Ransomware-Gang-Ragnar-Locker-9340480.html</span></a> <a href="https://social.tchncs.de/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> <a href="https://social.tchncs.de/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a></p>
Éric Freyssinet<p><span class="h-card" translate="no"><a href="https://mastodon.social/@lemonde" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>lemonde</span></a></span> "Rançongiciel : un homme soupçonné d’être un membre-clé du groupe <a href="https://mastodon.social/tags/RagnarLocker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RagnarLocker</span></a> arrêté en France"<br><a href="https://www.lemonde.fr/pixels/article/2023/10/20/rancongiciel-un-homme-soupconne-d-etre-un-membre-cle-du-groupe-ragnar-locker-arrete-en-france_6195662_4408996.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">lemonde.fr/pixels/article/2023</span><span class="invisible">/10/20/rancongiciel-un-homme-soupconne-d-etre-un-membre-cle-du-groupe-ragnar-locker-arrete-en-france_6195662_4408996.html</span></a></p>
Éric Freyssinet<p>Congrats to all the law enforcement colleagues who contributed to the successful blow this week against <a href="https://mastodon.social/tags/RagnarLocker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RagnarLocker</span></a> <br><a href="https://www.europol.europa.eu/media-press/newsroom/news/ragnar-locker-ransomware-gang-taken-down-international-police-swoop" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">europol.europa.eu/media-press/</span><span class="invisible">newsroom/news/ragnar-locker-ransomware-gang-taken-down-international-police-swoop</span></a></p><p><a href="https://mastodon.social/tags/ComCyberGend" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ComCyberGend</span></a> <a href="https://mastodon.social/tags/Europol" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Europol</span></a> <a href="https://mastodon.social/tags/Eurojust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Eurojust</span></a> <a href="https://mastodon.social/tags/Junalco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Junalco</span></a></p>
Miguel Afonso Caetano<p><a href="https://tldr.nettime.org/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://tldr.nettime.org/tags/Cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybercrime</span></a> <a href="https://tldr.nettime.org/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> <a href="https://tldr.nettime.org/tags/RagnarLocker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RagnarLocker</span></a>: "An international group of law enforcement agencies have disrupted the notorious RagnarLocker ransomware operation.</p><p>TechCrunch reported Thursday that an international law enforcement operation involving agencies from the U.S., European Union and Japan had seized the RagnarLocker group’s dark web portal. The portal, which the gang used to extort its victims by publishing their stolen data, now reads: “This service has been seized by a part of a coordinated international law enforcement action against the RagnarLocker group.”</p><p>Announcing the takedown on Friday, Europol confirmed it took coordinated action against RagnarLocker, which it says was responsible for “numerous high-profile attacks.” The European police agency also confirmed the arrest of a 35-year-old man in Paris on October 16, who the authorities accuse of being the “main perpetrator” of the operation. Authorities searched the alleged RagnarLocker developer’s home in the Czech Republic. Alleged associates of the developer were also interviewed in Spain and Latvia.</p><p>RagnarLocker’s infrastructure was also seized in the Netherlands, Germany and Sweden."</p><p><a href="https://techcrunch.com/2023/10/20/ragnarlocker-ransomware-dark-web-portal-seized-in-international-sting/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2023/10/20/ragn</span><span class="invisible">arlocker-ransomware-dark-web-portal-seized-in-international-sting/</span></a></p>
Tech news from Canada<p>Ars Technica: Feel-good story of the week: 2 ransomware gangs meet their demise <a href="https://arstechnica.com/?p=1977607" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="">arstechnica.com/?p=1977607</span><span class="invisible"></span></a> <a href="https://mastodon.roitsystems.ca/tags/Tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tech</span></a> <a href="https://mastodon.roitsystems.ca/tags/arstechnica" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>arstechnica</span></a> <a href="https://mastodon.roitsystems.ca/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://mastodon.roitsystems.ca/tags/Technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Technology</span></a> <a href="https://mastodon.roitsystems.ca/tags/ragnarlocker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ragnarlocker</span></a> <a href="https://mastodon.roitsystems.ca/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> <a href="https://mastodon.roitsystems.ca/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://mastodon.roitsystems.ca/tags/trigona" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>trigona</span></a> <a href="https://mastodon.roitsystems.ca/tags/Biz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Biz</span></a>&amp;IT</p>
Dissent Doe :cupofcoffee:<p>So an arrest was made in conjunction with the seizure of RagnarLocker's infrastructure and Tor leak site:</p><p>The "key target," who was arrested in Paris, is believed to be a developer of the malware:</p><p><a href="https://www.europol.europa.eu/media-press/newsroom/news/ragnar-locker-ransomware-gang-taken-down-international-police-swoop" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">europol.europa.eu/media-press/</span><span class="invisible">newsroom/news/ragnar-locker-ransomware-gang-taken-down-international-police-swoop</span></a> </p><p>To all the agencies who cooperated on this: bravo! </p><p><a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> <a href="https://infosec.exchange/tags/RagnarLocker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RagnarLocker</span></a> <a href="https://infosec.exchange/tags/europol" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>europol</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p>
Brett Callow<p>"One of the malware developers was detained in France. The other day, searches were also carried out against his accomplices on the territory of Spain, Latvia and the Czech Republic." <a href="https://infosec.exchange/tags/RagnarLocker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RagnarLocker</span></a> <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a></p><p><a href="https://cyberpolice.gov.ua/news/kiberpolicziya-spilno-z-inozemnymy-kolegamy-zneshkodyla-transnaczionalne-xakerske-ugrupovannya-8508/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cyberpolice.gov.ua/news/kiberp</span><span class="invisible">olicziya-spilno-z-inozemnymy-kolegamy-zneshkodyla-transnaczionalne-xakerske-ugrupovannya-8508/</span></a></p>
Brett Callow<p><a href="https://infosec.exchange/tags/RagnarLocker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RagnarLocker</span></a> <a href="https://infosec.exchange/tags/TangoDown" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TangoDown</span></a> <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a></p>